Most of the existing ciphertext-policy attribute-based encryption (CP-ABE) schemes that support outsourced decryption do not consider the privacy protection of the ciphertext access policy
while some schemes that support policy hidden have the problem of low access policy matching efficiency. Therefore
a CP-ABE scheme was proposed that supported access policy hidden and had high efficiency in access policy matching. In this scheme
the attribute values were blinded and a policy hidden access tree was constructed to realize the privacy protection of the access policy. Bloom filter was used to filter attributes and authenticate members
so as to quickly find the minimum set of attributes that meet the access policy and reduce a large number of invalid calculations in the decryption test. Finally
cloud servers with strong computing power for outsourced computing were used to reduce local decryption costs. Theoretical analysis and experimental results show that the proposed scheme can take into account both computational efficiency and policy privacy protection
and local decryption time is reduced to a constant level. Security analysis demonstrates that the proposed scheme not only protects the privacy of outsourced access policies but also can resist chosen plaintext attacks.
关键词
Keywords
references
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP '07) . Piscataway : IEEE Press , 2007 : 321 - 334 .
WATERS B . Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization [C ] // International Workshop on Public Key Cryptography . Berlin : Springer , 2011 : 53 - 70 .
FENG C S , YU K P , ALOQAILY M , et al . Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV [J ] . IEEE Transactions on Vehicular Technology , 2020 , 69 ( 11 ): 13784 - 13795 .
LI H , YU K P , LIU B , et al . An efficient ciphertext-policy weighted attribute-based encryption for the Internet of health things [J ] . IEEE Journal of Biomedical and Health Informatics , 2022 , 26 ( 5 ): 1949 - 1960 .
LI Q , ZHANG Q Q , HUANG H P , et al . Secure, efficient, and weighted access control for cloud-assisted industrial IoT [J ] . IEEE Internet of Things Journal , 2022 , 9 ( 18 ): 16917 - 16927 .
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts [C ] // Proceedings of the 20th USENIX Security Symposium . Berkeley : USENIX Association , 2011 : 523 - 538 .
SANCHOL P , FUGKEAW S , SATO H . A mobile cloud-based access control with efficiently outsourced decryption [C ] // Proceedings of the 2022 10th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) . Piscataway : IEEE Press , 2022 : 1 - 8 .
TU S S , HUANG F M , ZHANG S J , et al . Ciphertext-policy attribute-based encryption for securing IoT devices in fog computing [C ] // Proceedings of the 2022 International Conference on Computer, Information and Telecommunication Systems (CITS) . Piscataway : IEEE Press , 2022 : 1 - 7 .
HWANG Y W , LEE I Y . A study on CP-ABE based data sharing system that provides signature-based verifiable outsourcing [C ] // Proceedings of the 2021 International Conference on Advanced Enterprise Information System (AEIS) . Piscataway : IEEE Press , 2021 : 1 - 5 .
LIU X J , CHEN W , XIA Y J , et al . SE-VFC: secure and efficient outsourcing computing in vehicular fog computing [J ] . IEEE Transactions on Network and Service Management , 2021 , 18 ( 3 ): 3389 - 3399 .
WANG H Q , HE D B , HAN J G . VOD-ADAC: anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud [J ] . IEEE Transactions on Services Computing , 2020 , 13 ( 3 ): 572 - 583 .
NISHIDE T , YONEYAMA K , OHTA K . Attribute-based encrypttion with partially hidden encryptor-specified access structures [C ] // International Conference on Applied Cryptography & Network Security . Berlin : Springer , 2008 : 111 - 129 .
LAI J Z , DENG R H , LI Y J . Expressive CP-ABE with partially hidden access structures [C ] // Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security . New York : ACM Press , 2012 : 146 - 162 .
HAN D Z , PAN N N , LI K C . A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection [J ] . IEEE Transactions on Dependable and Secure Computing , 2022 , 19 ( 1 ): 316 - 327 .
ZHANG Y H , ZHENG D , DENG R H . Security and privacy in smart health: efficient policy-hiding attribute-based access control [J ] . IEEE Internet of Things Journal , 2018 , 5 ( 3 ): 2130 - 2145 .
ZHANG Z S , ZHANG W , QIN Z G . A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy- protective decryption testing in IoT assisted cloud computing [J ] . Future Generation Computer Systems , 2021 , 123 : 181 - 195 .
NASIRAEE H , ASHOURI-TALOUKI M . Privacy-preserving distributed data access control for CloudIoT [J ] . IEEE Transactions on Dependable and Secure Computing , 2022 , 19 ( 4 ): 2476 - 2487 .
ZHANG W , ZHANG Z S , XIONG H , et al . PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system [J ] . Journal of Ambient Intelligence and Humanized Computing , 2022 , 13 ( 1 ): 613 - 627 .
MAHDAVIOLIAEE M , AHMADIAN Z . Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits [J ] . Journal of Computer Virology and Hacking Techniques , 2023 , 19 ( 4 ): 515 - 528 .